Advertisement

Internet Architectures

  • Ali Sunyaev
Chapter
  • 50 Downloads

Abstract

In order to explain how the Internet works, this chapter takes a closer look at the architecture that underlies the Internet, as well as at its architectural principles and mechanisms. After providing a brief overview of the Internet’s history, this chapter examines today’s core infrastructure and explains the role of Internet service providers. In addition, the essential mechanisms enabling Internet communication are explained, namely the Internet Protocol (IP) suite, IP addresses, the domain name system (DNS), as well as IP packet routing and forwarding. This chapter also explains how large content providers, like Google, Amazon, and Netflix, provide Internet users all over the world with efficient and reliable services by utilizing specialized content delivery networks. The description of four emerging architectural concepts that extend the established Internet architecture with more efficient and/or effective ways of providing innovative Internet services (i.e., software-defined networking, network function virtualization, overlay networks, and information-centric networking) conclude this chapter.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Babay A, Danilov C, Lane J, Miskin-Amir M, Obenshain D, Schultz J, Stanton J, Tantillo T, Amir Y (2017) Structured overlay networks for a new generation of internet services. Paper presented at the international conference on distributed computing systems (ICDCS), Atlanta, GA, 5–8 June 2017Google Scholar
  2. Bagad VS, Dhotre IA (2009) Computer networks – II. Technical Publications, Pune, MaharashtraGoogle Scholar
  3. Baker FJ (2009) Core protocols in the internet protocol suite. https://tools.ietf.org/id/draft-baker-ietf-core-04.html. Accessed 19 Sept 2019
  4. Bartolini N, Casalicchio E, Tucci S (2003) A walk through content delivery networks. Paper presented at the international workshop on modeling, analysis, and simulation of computer and telecommunication systems, Orlando, FL, 12–15 Oct 2003Google Scholar
  5. Baumann R, Heimlicher S, Strasser M, Weibel A (2007) A survey on routing metrics. http://rainer.baumann.info/public/tik262.pdf. Accessed 19 Sept 2019
  6. Bellman R (1958) On a routing problem. Q Appl Math 16(1):87–90zbMATHCrossRefGoogle Scholar
  7. Benzekki K, El Fergougui A, Elalaoui AE (2017) Software-defined networking (SDN): a survey. Secur Commun Netw 9(18):5803–5833CrossRefGoogle Scholar
  8. Berners-Lee T, Bray T, Connolly D, Cotton P, Fielding R, Jeckle M, Lilley C, Mendelsohn N, Orchard D, Walsh N, Williams S (2004) Architecture of the world wide web, vol 1 W3C. https://www.w3.org/TR/webarch/. Accessed 19 Sept 2019
  9. Braga R, Mota E, Passito A (2010) Lightweight DDoS flooding attack detection using NOX/OpenFlow. Paper presented at the IEEE local computer network conference, Denver, CO, 10–14 Oct 2010Google Scholar
  10. Cerf V, Kahn R (1974) A protocol for packet network interconnection. IEEE Trans Commun 22(5):637–648CrossRefGoogle Scholar
  11. Cerf V, Sunshine C (1974) Specification of internet transmission control program. https://tools.ietf.org/html/rfc675. Accessed 19 Sept 2019
  12. Chandramouli R, Rose S (2006) Challenges in securing the domain name system. IEEE Comput Soc 4(1):84–87Google Scholar
  13. Chapin L (1992) Charter of the internet architecture board (IAB). https://tools.ietf.org/html/rfc1358. Accessed 19 Sept 2019
  14. Chiosi M, Clarke D, Willis P, Reid A, Feger J, Bugenhagen M, Khan W, Fargano M, Cui C, Deng H, Benitez J, Michel U, Damker H, Ogaki K, Matsuzaki T, Fukui M, Shimano K, Delisle D, Loudier Q, Kolias C, Guardini I, Demaria E, Minerva R, Manzalini A, López D, Salguero FJR, Ruhl F, Sen P (2012) Network functions virtualisation: an introduction, benefits, enablers, challenges & call for action. Paper presented at the SDN and OpenFlow world congress, Darmstadt, 22–24 Oct 2012Google Scholar
  15. Cisco (2011) Content delivery network (CDN) federations: how SPs can win the battle for content-hungry consumers. https://www.cisco.com/c/dam/en/us/products/collateral/video/videoscape-distribution-suite-service-broker/cdn_vds_sb_white_paper.pdf. Accessed 19 Sept 2019
  16. Cisco (2018) Cisco visual networking index: forecast and trends, 2017–2022. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-741490.html. Accessed 19 Sept 2019
  17. Comer D (2015) Computer networks and internets, 6th edn. Pearson Education, LondonGoogle Scholar
  18. Cooper I, Tomlinson G (2001) Internet web replication and caching taxonomy. https://tools.ietf.org/html/rfc3040. Accessed 19 Sept 2019
  19. Deering S, Hinden R (1995) Internet protocol, version 6 (IPv6): specification. https://tools.ietf.org/html/rfc1883. Accessed 16 Sept 2019
  20. Deering S, Hinden R (1998) Internet protocol, version 6 (IPv6): specification. https://tools.ietf.org/html/rfc2460. Accessed 19 Sept 2019
  21. Deering S, Hinden R (2017) Internet protocol, version 6 (IPv6) specification. https://tools.ietf.org/html/rfc8200. Accessed 16 Sept 2019
  22. Dehling T, Sunyaev A (2014) Information security and privacy of patient-centered health it services: what needs to be done? Paper presented at the 47th Hawaii international conference on system sciences, Waikoloa, HI, 6–9 Jan 2014Google Scholar
  23. Dijkstra EW (1959) A note on two problems in connexion with graphs. Numer Math 1(1):269–271MathSciNetzbMATHCrossRefGoogle Scholar
  24. Dougherty D, Truelove K, Shirky C, Dornfest R, Gonze L (2002) 2001 P2P networking overview: the emergent P2P platform of presence, identity, and edge resources. O’Reilly, Sebastopol, CAGoogle Scholar
  25. Duan Q, Toy M (2016) Virtualized software-defined networks and services. Artech House, LondonGoogle Scholar
  26. ETSI (2013) Network function virtualisation (NFV); architectural framework. https://www.etsi.org/deliver/etsi_gs/NFV/001_099/002/01.01.01_60/gs_NFV002v010101p.pdf. Accessed 19 Sept 2019
  27. ETSI (2018) Network functions virtualisation (NFV); terminology for main concepts in NFV. https://www.etsi.org/deliver/etsi_gs/NFV/001_099/003/01.04.01_60/gs_NFV003v010401p.pdf. Accessed 19 Sept 2019
  28. Falk A (2009) Definition of an internet research task force (IRTF) document stream. https://tools.ietf.org/html/rfc5743. Accessed 19 Sept 2019
  29. Fall KR, Stevens RW (2011) TCP/IP illustrated, vol 1. Addison-Wesley, Ann Arbor, MIGoogle Scholar
  30. Ford LR, Fulkerson DR (1956) Maximal flow through a network. Can J Math 8(1):399–404MathSciNetzbMATHCrossRefGoogle Scholar
  31. Fotiou N, Nikander P, Trossen D, Polyzos GC (2010) Developing information networking further: from PSIRP to PURSUIT. Paper presented at the international conference on broadband communications, networks and systems, Athens, 25–27 Oct 2010Google Scholar
  32. Frazer KD, Merit Network Inc., National Science Foundation (1996) NSFNET: a partnership for high-speed networking: final report, 1987–1995. Merit Network, Ann Arbor, MIGoogle Scholar
  33. Galán-Jiménez J, Gazo-Cervero A (2011) Overview and challenges of overlay networks: a survey. Int J Comput Sci Eng Surv 2(1):19–37CrossRefGoogle Scholar
  34. Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014) Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62(7):122–136CrossRefGoogle Scholar
  35. Gokhale AA (2005) Introduction to telecommunications. Thomson/Delmar Learning, Clifton Park, NYGoogle Scholar
  36. Google (2012) Inter-datacenter WAN with centralized TE using SDN and OpenFlow. https://www.opennetworking.org/wp-content/uploads/2013/02/cs-googlesdn.pdf. Accessed 19 Sept 2019
  37. Grance T, Hash J, Peck S, Smith J, Korow-Diks K (2008) Security guide for interconnecting information technology systems. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-47.pdf
  38. Hinden R, Deering S (2006) IP version 6 addressing architecture. https://tools.ietf.org/html/rfc4291. Accessed 19 Sept 2019
  39. Hofmann M, Leland RB (2005) Content networking: architecture, protocols, and practice. The Morgan Kaufmann series in networking. Morgan Kaufmann, San Francisco, CAGoogle Scholar
  40. Hornig C (1984) A standard for the transmission of IP datagrams over ethernet networks. https://tools.ietf.org/html/rfc894. Accessed 19 Sept 2019
  41. Huang D, Wu H (2018) Mobile cloud computing: foundations and service models. Elsevier, Cambridge, MACrossRefGoogle Scholar
  42. Hunt C (2002) TCP/IP network administration, 3rd edn. O’Reilly Media, Sebastopol, CAzbMATHGoogle Scholar
  43. ICNRG (2018) Information-centric networking research group. https://irtf.org/icnrg. Accessed 1 Dec 2018
  44. IETF (1989a) Requirements for internet hosts – application and support. https://tools.ietf.org/html/rfc1123. Accessed 16 Sept 2019
  45. IETF (1989b) Requirements for internet hosts – communication layers. https://tools.ietf.org/html/rfc1122. Accessed 16 Sept 2019
  46. IETF (2003) A model for content internetworking (CDI). https://tools.ietf.org/html/rfc3466. Accessed 16 Sept 2019
  47. Information Sciences Institute (1981) Transmission control protocol. https://tools.ietf.org/html/rfc793. Accessed 16 Sept 2019
  48. Jacobson V, Smetters D, Thornton J, Plass M, Briggs N, Braynard R (2009) Networking named content. Paper presented at the 5th international conference on emerging networking experiments and technologies, Rome, 1–4 Dec 2009Google Scholar
  49. Jordana J (2002) Governing telecommunications and the new information society in Europe. Edward Elgar, CheltenhamCrossRefGoogle Scholar
  50. Kozierok CM (2005) The TCP/IP guide: a comprehensive, illustrated internet protocols reference. No Starch Press, San Francisco, CAGoogle Scholar
  51. Kutscher D, Eum S, Pentikousis K, Psaras I, Corujo D, Saucez D, Schmidt T, Waehlisch M (2016) Information-centric networking (ICN) research challenges. https://www.rfc-editor.org/pdfrfc/rfc7927.txt.pdf. Accessed 16 Sept 2019
  52. Li J (2008) On peer-to-peer (P2P) content delivery. Peer Peer Netw Appl 1(1):45–63MathSciNetCrossRefGoogle Scholar
  53. Little RG (2012) Software-defined networking is not OpenFlow, companies proclaim. https://searchnetworking.techtarget.com/news/2240158633/Software-defined-networking-is-not-OpenFlow-companies-proclaim. Accessed 4 Sept 2019
  54. Little RG (2013) InCNTRE’s OpenFlow SDN testing lab works toward certified SDN product. https://searchnetworking.techtarget.com/news/2240186631/InCNTREs-OpenFlow-SDN-testing-lab-works-toward-certified-SDN-product. Accessed 4 Sept 2019
  55. Malatras A (2015) State-of-the-art survey on P2P overlay networks in pervasive computing environments. J Netw Comput Appl 55(1):1–23CrossRefGoogle Scholar
  56. Mansfield KC, Antonakos JL (2009) Computer networking for LANS to WANS: hardware, software and security. Cengage Learning, Boston, MAGoogle Scholar
  57. Mills DL, Braun H (1987) The NSFNET backbone network. ACM SIGCOMM Comput Commun Rev 17(5):191–196CrossRefGoogle Scholar
  58. Mockapetris P (1983a) Domain names – concepts and facilities. https://tools.ietf.org/html/rfc882. Accessed 16 Sept 2019
  59. Mockapetris P (1983b) Domain names – implementation and specification. https://tools.ietf.org/html/rfc883. Accessed 16 Sept 2019
  60. NIST (2013) Security and privacy controls for federal information systems and organizations. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf. Accessed 16 Sept 2019
  61. Norton WB (2011) The internet peering playbook: connecting to the core of the internet, 2nd edn. DrPeering Press, Palo Alto, CAGoogle Scholar
  62. Open Networking Foundation (2012) Software-defined networking: the new norm for networks. https://www.opennetworking.org/images/stories/downloads/sdn-resources/white-papers/wp-sdn-newnorm.pdf. Accessed 16 Sept 2019
  63. Pathan M, Buyya R, Vakali A (2008) Content delivery networks: state of the art, insights, and imperatives. In: Buyya R, Pathan M, Vakali A (eds) Content delivery networks. Lecture Notes electrical engineering, vol 9. Springer, Berlin, pp 3–32CrossRefGoogle Scholar
  64. Piliouras TC, Terplan K (1998) Network design: management and technical perspectives. CRC Press, LondonzbMATHGoogle Scholar
  65. Robinson D (2017) Content delivery networks: fundamentals, design, and evolution, 1st edn. Wiley, Hoboken, NJCrossRefGoogle Scholar
  66. Saltzer JH, Reed DP, Clark DD (1984) End-to-end arguments in system design. ACM Trans Comput Syst 2(4):277–288CrossRefGoogle Scholar
  67. Savitz E (2012) Netflix shifts traffic to its own CDN; Akamai, Limelight Shrs Hit. https://www.forbes.com/sites/ericsavitz/2012/06/05/netflix-shifts-traffic-to-its-own-cdn-akamai-limelight-shrs-hit/. Accessed 4 Sept 2019
  68. Sitaraman RK, Kasbekar M, Lichtenstein W, Jain M (2014) Overlay networks: an Akamai perspective. In: Pathan M, Sitaraman RK, Robinson D (eds) Advanced content delivery, streaming, and cloud services, 1st edn. Wiley, Hoboken, NJ, pp 305–328Google Scholar
  69. Stevenson A, Waite M (2011) Concise Oxford english dictionary, 12th edn. Oxford University Press, New York, NYGoogle Scholar
  70. Stewart B (2000) CSNET – computer science network. https://www.livinginternet.com/i/ii_csnet. Accessed 4 Sept 2019
  71. Stutzbach D, Zappala D, Rejaie R (2005) The scalability of swarming peer-to-peer content delivery. Paper presented at the international conference on research in networking, Waterloo, ON, 2–6 May 2005Google Scholar
  72. Subramanian S, Voruganti S (2016) Software-defined networking (SDN) with OpenStack. Packt Publishing, BirminghamGoogle Scholar
  73. Sunyaev A, Pflug J (2012) Risk evaluation and security analysis of the clinical area within the German electronic health information system. Heal Technol 2(2):123–135CrossRefGoogle Scholar
  74. Sunyaev A, Leimeister JM, Krcmar H (2010) Open security issues in German healthcare telematics. Paper presented at the 3rd international conference on health informatics (HealthInf), Valencia, 20–23 Jan 2010Google Scholar
  75. Tarkoma S, Ain M, Visala K (2009) The publish/subscribe internet routing paradigm (PSIRP): designing the future internet architecture. In: Tselentis G, Domingue J, Galis A et al (eds) A European research perspective. IOS Press, Amsterdam, pp 102–111Google Scholar
  76. W3C (2017) W3C mission. https://www.w3.org/Consortium/mission. Accessed 4 Sept 2019
  77. Yaqub MA, Ahmed SH, Bouk SH, Kim D (2016) Information-centric networks (ICN). In: Ahmed SH, Bouk SH, Kim D (eds) Content-centric networks: an overview, applications and research challenges. Springer, Singapore, pp 19–33CrossRefGoogle Scholar

Further Reading

  1. Berners-Lee T, Bray T, Connolly D, Cotton P, Fielding R, Jeckle M, Lilley C, Mendelsohn N, Orchard D, Walsh N, Williams S (2004) Architecture of the world wide web, vol 1 W3C. https://www.w3.org/TR/webarch/. Accessed 19 Sept 2019
  2. Comer D (2015) Computer networks and internets, 6th edn. Pearson Education, LondonGoogle Scholar
  3. Hunt C (2002) TCP/IP network administration, 3rd edn. O’Reilly Media, Sebastopol, CAzbMATHGoogle Scholar
  4. Mansfield KC, Antonakos JL (2009) Computer networking for LANS to WANS: hardware, software and security. Cengage Learning, Boston, MAGoogle Scholar
  5. Singh MP (2005) The practical handbook of internet computing. CRC Press, Boca Raton, FlzbMATHGoogle Scholar
  6. Tanenbaum AS, Van Steen M (2017) Distributed systems: principles and paradigms, 2nd edn. Prentice-Hall, Upper Saddle River, NJGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Ali Sunyaev
    • 1
  1. 1.Institute of Applied Informatics and Formal Description MethodsKarlsruhe Institute of TechnologyKarlsruheGermany

Personalised recommendations